• Aucun résultat trouvé

Secure a zone with robots

N/A
N/A
Protected

Academic year: 2021

Partager "Secure a zone with robots"

Copied!
2
0
0

Texte intégral

(1)

Secure a zone with robots

Luc Jaulin and Benoˆıt Zerr

Lab-STICC, ENSTA Bretagne, Brest, France lucjaulin@gmail.com

Problem. We consider n underwater robots R1, . . . ,Rn at po- sitions a1, . . . ,an and moving in a 2D world [1]. Each robot has a visibility zone. If an intruder is inside the visibility zone of one robot, it is detected. The robots have collaborate to guarantee that they is no moving intruder inside a subzone of a compact subset O of R2, representing the 2D ocean.

Complementary approach. We assume that there exists a vir- tual intruder moving inside O satisfying the differential inclusion

˙

x(t) ∈ F(x(t)),

where x(t) is the state vector. Moreover, we assume that each robot Ri has a visibility zone of the form g−1ai ([0, d]) where dis the scope. Our contribution is to show that characterizing the secure zone translates into a set-membership set estimation problem [2] where x(t) is shown to be inside the set X(t) returned by our set-membership observer.

Then we conclude that x(t) cannot be inside the complementary of X(t). This result can be formalized by the following theorem.

Theorem. The virtual intruder has a state vector x(t) inside the set

X(t) = O∩dt·F(X(t−dt)) ∩ \

i

ga−1

i(t)([d(t),∞]), where X(0) = O. As a consequence, the secure zone is

S(t) = projworld(X(t)).

1

(2)

Figure 1: (left) Paving of the Biscay Bay, (right) Green: Secured zone

Proof (sketch). Two cases should be considered. If no actual intruder exists then S(t) cannot is secured. If the virtual intruder is a real one, its state x(t) is inside X(t) and its position (which is a part of the state) is inside projworld(X(t)). In both situations, the intruder can not be inside S(t).

Method. Each robot follows a reference point. All reference points form a flat ellipsoid which plays the role of a barrier. The strategy is illustrated by Fig 1 for 10 robots. The set O corresponds to the blue area (left). On the right, S(t) is painted green. The observer has been implemented using interval analysis.

References:

[1] L. Jaulin, Mobile robotics, ISTE editions, London, 2016.

[2] M. Kieffer, L. Jaulin, E. Walter, D. Meizel, Nonlinear Identification Based on Unreliable Priors and Data, with Applica- tion to Robot Localization, Robustness in Identification and Con- trol, 3 (1999), LNCIS 245, pp. 190–203.

2

Références

Documents relatifs

vhw jhqhudwhv d yhfwru ri prgho rxwsxwv O sEO R wr eh frpsduhg zlwk wkh gdwd yhfwru O+1 Lq wkh frqwh{w ri erxqghg0huuru hvwlpdwlrq/ vhh/ h1j1/ ^5:`> ^6`/ ^:`> ^56`>

Population qui croit aussi le plus fortement en Europe, la France ne compte pas encore dans le monde de la finance islamique, sauf quelques banques qui sont actives sur ce

نارهو تعماج 2 ةيعاوتجلاا مولعلا ةيلك عاوتجلاا نلع نسق ةلاسر لينل رٍتسجاملا ةداهش يف ملع ًساٍسلا عامتجلاا ملع صصخت عامتجا تٍعٌرشتلا

The goal of this paper is twofold: (1) to characterize a set for which we can guarantee that there is no intruder (this corresponds to the secure zone) and (2) to find a

A toolbox for Matlab is now available : the CONtinuous-Time System IDentification (CONTSID) toolbox which supports continuous-time transfer function or state-space model

To solve this issue, in this paper, we will analyze the robot trajectory in singular situation, and we will determine a feasible trajectory to avoid singularity through a

Following on from this, a set of requirements based on the drawbacks of the previous- ly mentioned methods will be derived, then used to implement a solution that consid- ers these

In the AFM-enabled indentation of brain tissue illustrated herein, we measured viscoelastic properties using creep compliance and force relaxation1. Because of the small scale of